0% found this document useful (0 votes)
119 views24 pages

Cam Analysis

A computer system consists of six main elements: hardware, software, people, procedures, data, and connectivity. It is defined as a set of these six elements. The document then provides details about each element, describing hardware as the physical components like keyboards and processors. It defines software as the set of programs that form the interface between hardware and users. People are described as the most important element as the users of the system. Procedures are defined as step-by-step instructions to perform functions. Data is defined as the facts and figures fed into the computer. Finally, connectivity is defined as connecting two or more computers to share information and resources.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views24 pages

Cam Analysis

A computer system consists of six main elements: hardware, software, people, procedures, data, and connectivity. It is defined as a set of these six elements. The document then provides details about each element, describing hardware as the physical components like keyboards and processors. It defines software as the set of programs that form the interface between hardware and users. People are described as the most important element as the users of the system. Procedures are defined as step-by-step instructions to perform functions. Data is defined as the facts and figures fed into the computer. Finally, connectivity is defined as connecting two or more computers to share information and resources.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Microsoft Word

Elements of a Computer System:


A computer system is a set of six elements viz.:
(i) Hardware,
(ii) Software,
(iii) People,
(iv) Procedures,
(v) Data and
(vi) Connectivity.
(i) Hardware:
The physical components of a computer constitute its Hardware. These
include keyboard, mouse, monitor and processor. Hardware consists of
input devices and output devices that make a complete computer system.
(ii) Software:
A set of programs that form an interface between the hardware and the
user of a computer system are referred to as Software.
(iii) People:
The most important element of a computer system is its users. They are
also called live-ware of the computer system.
iv) Procedures:
Procedure is a step by step series of instructions to perform a specific
function and achieve desired output.
(v) Data:
The facts and figures that are fed into a computer for further processing are
called data.
(vi) Connectivity:
When two or more computers are connected to each other, they can share
information and resources such as sharing of files (data/music etc.),
sharing of printer, sharing of facilities like the internet etc.
List of Peripheral and storage Device of Computer
System

Inputs Outputs Storage

• Keyboard • Monit or( • Hard Drives


• • Hard Drives CRT E
Mou se LCD,
• Flash Drive
• Touchpad
• Pri n ters
• • Recording Tape
Recording
• Touch sc reen
• Proje ctor. Tape
• Speaker
• Monitor
• Head Ph one.
• Joystick
• Scanner
COMPUTER GENERATIONS
Table of content
Generations Year computer
First Generations 1940-1956 Vaccum tubes
Second Generations 1956-1963 Transistors
Third Generations 1964-1971 Integrated Circuits
Fourth Generations 1971 Microprocessors
Fifth Generations present Artificial Intelligence

First Generation (1940-1956) Vacuum Tubes


The first computers used vacuum tubes for circuitry and magnetic drums
for memory, and were often enormous, taking up entire rooms. First
generation computers relied on machine language, the lowest-level
programming language understood by computers, to perform operations,
and they could only solve one problem at a time. Input was based on
punched cards and paper tape, and output was displayed on printouts.
The UNIVAC and ENIAC computers are examples of first-generation
computing devices. The UNIVAC was the first commercial computer
delivered to a business client, the U.S. Census Bureau in 1951.
FEATURES OF FIRST GENERATION
1. Use of vacuum tubes
2. Big & Clumsy
3. High Electricity Consumption
4. Programming in Mechanical Language
5. Larger AC were needed
6. Lot of electricity failure occurred
FIRST GENERATION
Second Generation (1956-1963) Transistors
Transistors replaced vacuum tubes and ushered in the second generation
of computers. The transistor was invented in 1947 but did not see
widespread use in computers until the late 1950s. The transistor was far
superior to the vacuum tube, allowing computers to become smaller, faster,
cheaper, more energy-efficient and more reliable than their first-generation
predecessors. Though the transistor still generated a great deal of heat that
subjected the computer to damage, it was a vast improvement over the
vacuum tube. Second-generation computers still relied on punched cards
for input and printouts for output.
FEATURES OF SECOND GENERATION
1. Transistors were used
2. Core Memory was developed
3. Faster than First Generation computers
4. First Operating System was developed
5. Programming was in Machine Language & Aseembly Language
6. Magnetic tapes & discs were used
7. Computers became smaller in size than the First Generation computers
8. Computers consumed less heat & consumed less electricity

SECOND GENERATION

Third Generation (1964-1971) Integrated Circuits


The development of the integrated circuit was the hallmark of the third
generation of computers. Transistors were miniaturized and placed on
silicon chips, called semiconductors, which drastically increased the speed
and efficiency of computers.
Instead of punched cards and printouts, users interacted with third
generation computers through keyboards and monitors and interfaced with
an operating system, which allowed the device to run many different
applications at one time with a central program that monitored the memory.
Computers for the first time became accessible to a mass audience
because they were smaller and cheaper than their predecessors.
THIRD GENERATION FEATURES
1. Integrated circuits developed
2. Power consumption was low
3. SSI & MSI Technology was used
4. High level languages were used
THIRD GENERATION

Fourth Generation (1971-Present) Microprocessors


The microprocessor brought the fourth generation of computers, as
thousands of integrated circuits were built onto a single silicon chip. What
in the first generation filled an entire room could now fit in the palm of the
hand. The Intel 4004 chip, developed in 1971, located all the components
of the computer—from the central processing unit and memory to
input/output controls—on a single chip.
FOURTH GENERATION FIFTH GENERATION

Fifth Generation (Present and Beyond) Artificial Intelligence


Fifth generation computing devices, based on artificial intelligence, are still
in development, though there are some applications, such as voice
recognition, that are being used today.
OPERATING SYSTEM
An operating system (OS) is system software that manages computer
hardware, software resources, and provides common services for computer
programs.Time-sharing operating systems schedule tasks for efficient use
of the system and may also include accounting software for cost allocation
of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation,
the operating system acts as an intermediary between programs and the
computer hardware,[1][2] although the application code is usually executed
directly by the hardware and frequently makes system calls to an OS
function or is interrupted by it. Operating systems are found on many
devices that contain a computer – from cellular phones and video game
consoles to web servers and supercomputers.
The dominant desktop operating system is Microsoft Windows with a
market share of around 82.74%. macOS by Apple Inc. is in second place
(13.23%), and the varieties of Linux are collectively in third place
(1.57%).[3] In the mobile (including smartphones and tablets) sector,
Google Android's share is up to 70% in the year 2017.[4] According to third
quarter 2016 data, Android's share on smartphones is dominant with 87.5
percent with also a growth rate of 10.3 percent per year, followed by
Apple's iOS with 12.1 percent with per year decrease in market share of
5.2 percent, while other operating systems amount to just 0.3 percent.[5]
Linux distributions are dominant in the server and supercomputing sectors.
Other specialized classes of operating systems, such as embedded and
real-time systems, exist for many applications.
Types of operating systems
Single-tasking and multi-tasking
A single-tasking system can only run one program at a time, while a multi-
tasking operating system allows more than one program to be running in
concurrency. This is achieved by time-sharing, where the available
processor time is divided between multiple processes. These processes
are each interrupted repeatedly in time slices by a task-scheduling
subsystem of the operating system. Multi-tasking may be characterized in
preemptive and co-operative types. In preemptive multitasking, the
operating system slices the CPU time and dedicates a slot to each of the
programs. Unix-like operating systems, such as Solaris and Linux—as well
as non-Unix-like, such as AmigaOS—support preemptive multitasking.
Cooperative multitasking is achieved by relying on each process to provide
time to the other processes in a defined manner. 16-bit versions of
Microsoft Windows used cooperative multi-tasking. 32-bit versions of both
Windows NT and Win9x, used preemptive multi-tasking.
Single- and multi-user
Single-user operating systems have no facilities to distinguish users, but
may allow multiple programs to run in tandem.[6] A multi-user operating
system extends the basic concept of multi-tasking with facilities that identify
processes and resources, such as disk space, belonging to multiple users,
and the system permits multiple users to interact with the system at the
same time. Time-sharing operating systems schedule tasks for efficient use
of the system and may also include accounting software for cost allocation
of processor time, mass storage, printing, and other resources to multiple
users.
Distributed
A distributed operating system manages a group of distinct computers and
makes them appear to be a single computer. The development of
networked computers that could be linked and communicate with each
other gave rise to distributed computing. Distributed computations are
carried out on more than one machine. When computers in a group work in
cooperation, they form a distributed system.[7]
Templated
In an OS, distributed and cloud computing context, templating refers to
creating a single virtual machine image as a guest operating system, then
saving it as a tool for multiple running virtual machines. The technique is
used both in virtualization and cloud computing management, and is
common in large server warehouses.[8]
Embedded
Embedded operating systems are designed to be used in embedded
computer systems. They are designed to operate on small machines like
PDAs with less autonomy. They are able to operate with a limited number
of resources. They are very compact and extremely efficient by design.
Windows CE and Minix 3 are some examples of embedded operating
systems.
Real-time
A real-time operating system is an operating system that guarantees to
process events or data by a specific moment in time. A real-time operating
system may be single- or multi-tasking, but when multitasking, it uses
specialized scheduling algorithms so that a deterministic nature of behavior
is achieved. An event-driven system switches between tasks based on their
priorities or external events while time-sharing operating systems switch
tasks based on clock interrupts.
Library
A library operating system is one in which the services that a typical
operating system provides, such as networking, are provided in the form of
libraries and composed with the application and configuration code to
construct a unikernel: a specialized, single address space, machine image
that can be deployed to cloud or embedded environments.
Network topology is the arrangement of the elements (links, nodes, etc.) of
a communication network.[1][2] Network topology can be used to define or
describe the arrangement of various types of telecommunication networks,
including command and control radio networks,[3] industrial fieldbusses
and computer networks.
LAN topology
Network topology is the topological[4] structure of a network and may be
depicted physically or logically. It is an application of graph theory[3]
wherein communicating devices are modeled as nodes and the
connections between the devices are modeled as links or lines between the
nodes. Physical topology is the placement of the various components of a
network (e.g., device location and cable installation), while logical topology
illustrates how data flows within a network. Distances between nodes,
physical interconnections, transmission rates, or signal types may differ
between two different networks, yet their topologies may be identical. A
network’s physical topology is a particular concern of the physical layer of
the OSI model.
Examples of network topologies are found in local area networks (LAN), a
common computer network installation. Any given node in the LAN has one
or more physical links to other devices in the network; graphically mapping
these links results in a geometric shape that can be used to describe the
physical topology of the network. A wide variety of physical topologies have
been used in LANs, including ring, bus, mesh and star. Conversely,
mapping the data flow between the components determines the logical
topology of the network. In comparison, Controller Area Networks, common
in vehicles, are primarily distributed control system networks of one or more
controllers interconnected with sensors and actuators over, invariably, a
physical bus topology.
Topologies[edit]
Diagram of different network topologies.
Two basic categories of network topologies exist, physical topologies and
logical topologies.
The transmission medium layout used to link devices is the physical
topology of the network. For conductive or fiber optical mediums, this refers
to the layout of cabling, the locations of nodes, and the links between the
nodes and the cabling.[1] The physical topology of a network is determined
by the capabilities of the network access devices and media, the level of
control or fault tolerance desired, and the cost associated with cabling or
telecommunication circuits.
In contrast, logical topology is the way that the signals act on the network
media, or the way that the data passes through the network from one
device to the next without regard to the physical interconnection of the
devices. A network's logical topology is not necessarily the same as its
physical topology. For example, the original twisted pair Ethernet using
repeater hubs was a logical bus topology carried on a physical star
topology. Token ring is a logical ring topology, but is wired as a physical
star from the media access unit. Physically, AFDX can be a cascaded star
topology of multiple dual redundant Ethernet switches; however, the AFDX
Virtual links are modeled as time-switched single-transmitter bus
connections, thus following the safety model of a single-transmitter bus
topology previously used in aircraft. Logical topologies are often closely
associated with media access control methods and protocols. Some
networks are able to dynamically change their logical topology through
configuration changes to their routers and switches.
Invitation letter

From,

Aafreen begum
Sunder nagar, bhilai

Date: 04/11/2019
To,

Mahnaj
Farid nagar bhilai
Subject: Social event letter
Dear mahnaj,

We are very much pleased to inform you that we are organizing a get
together and we would be very much honored if you remain present in
the event.

The event would be organized on 10/11/2019 and the venue is fixed at


hotel amit international. You must be present at the venue within 11 am
and you must know that a event is a casual party.

We hope that we would get your valuable presence in the event because
your presence means a lot for us and for the event.

Thanking You,
Yours Truly
Aafreen begum
PPT ON RELIANCE JIO
RELIANCE JIO

INTRODUCTION

Reliance Jio Infocomm Limited (Jio), the telecommunication arm of Reliance


Industries Limited (RIL), crossed 100 million in subscribers in less than six
months of its launch in September 2016. Reportedly, Jio was the only telecom
operator in India with fully data-centric services, entirely based on voice over
long-term evolution (VoLTE) technology, which allowed voice to be transferred
over an internet protocol (IP) network at much faster speeds than on
traditional networks using 2G and 3G technologies. According to Reliance Jio
Chairman Mukesh Ambani (Ambani), for 170 days, Jio had added an average
of nearly 7 customers on its network every single second of every single day –
an unprecedented level of acceptance for any technology company anywhere
in the world. The Jio network had generated a world record by crossing 16
million in total subscribers during the first month of its operations. The network
crossed the 50-million subscriber mark in just 83 days of its launch, adding an
average of 600,000 subscribers a day.

BACKGROUND NOTE

The Reliance Group was founded by Dhirajlal Hirachand Ambani popularly


known as Dhirubhai. Born on December 28, 1932, in a small village of
Gujarat, a state in western India, Dhirubhai was the second son of a poor
school teacher. Dhirubhai returned to India in 1957 after a stint with A. Besse
& Co., Aden , Yemen. He started a yarn trading business from a small 500 sq.
ft. office in South Mumbai. The trading agency, Reliance Commercial
Corporation, imported polyester yarn that was sold to textile manufacturers,
and exported spices. Sensing an opportunity in the textile sector, Dhirubhai
obtained the necessary clearances to manufacture cloth from polyester fiber.
Reliance’s first textile mill was opened in Naroda in Gujarat in 1966. Dhirubhai
went on to establish a highly successful clothing brand named Vimal.
TELECOMMUNICATION SECTOR IN INDIA

The Department of Telecommunications (DoT) was set up by the Government


of India (GoI) in the 1980s. Its function was to manage all telecommunication
services within the country. In 1986, the GoI sought to modernize the
telecommunications facilities in the country and it established Mahanagar
Telephone Nigam Limited (MTNL) to look after services in Mumbai and New
Delhi, and Videsh Sanchar Nigam Limited (VSNL) to handle overseas
services. The rest of the nation’s services were to be run by the DoT. In 1994,
India ranked sixth in the world in terms of number of installed fixed lines. The
GoI introduced the National Telecom Policy (NTP) in 1994 to improve India’s
position in global telecommunications. The introduction of the NTP led to a
metamorphosis of the industry as it allowed the private sector to invest in
telecommunications..
JIO ENTERS THE INDIAN TELECOM MARKET
Reportedly, Jio’s launch had been in the making for about six years. Jio was
established based on Ambani’s belief that mobile internet was the
revolutionary technology of the 21st century. Ambani re-entered the telecom
sector by acquiring a company that had bought a pan-India 4G spectrum in
the 2300 MHz band in 2010. In 2010, RIL entered the broadband services
market with the acquisition of Infotel Broadband Services Limited (Infotel),
which was the only successful bidder for the pan-India fourth-generation (4G)
spectrum auction held by the Government of India. RIL had paid Rs. 48 billion
to Infotel to pick up 95% of its stake. Infotel had its name changed to Reliance
Jio Infocomm Limited (RJIL) in January 2013....

JIO-A GAME CHANGER


Access to the Jio service was facilitated from September 5, 2016. Jio had
introduced Aadhaar -based digital Jio SIM activation across 3,100 cities and
towns in India. This allowed the customer to complete the SIM activation
procedure within minutes using his/her Aadhaar number. Reportedly, people
across cities in India waited in serpentine queues to buy an RJio SIM card.
Application forms which were supposed to be free were reportedly sold in the
black market for Rs.100 each. Jio even started home delivery of Jio SIMs in
December 2016. One could register to get a Jio SIM home-delivered and it
could be activated within 5 minutes through eKYC. This service was active in
8 cities of India – Mumbai, Delhi (NCR), Kolkata, Chennai, Bangalore,
Hyderabad, Pune, and Ahmedabad.....

COMPETITIVE PRICING
Jio, which disrupted the Indian telecom market with its six-month-long free
data services, started charging customers from April 1, 2017. Ambani
announced Jio’s tariff plans in February 2017, including the special Jio Prime
membership and the “Everyday More-Value” offer. The Jio Prime membership
offered 1 GB high-speed 4G data and free calls for Rs. 10 a day for a year.
The membership fee for Jio Prime was Rs. 99 per year. The unlimited free
voice, free data offered in the ‘Happy New Year’ scheme would be available to
Jio Prime members till March 31, 2018, at an introductory price of Rs. 303 per
month. Jio Prime members would also be able to enjoy all Jio’s applications
worth over Rs. 10,000 absolutely free till March 31, 2018. Jio in addition to its
own tariff plans, also came up with the ‘Everyday More-Value’ offer in March
2017 under which its customers had the option to choose a Jio plan that
matched the highest selling tariff plan of any of the other leading Indian
telecom operators and would get 20% more data than other operator
offered.....

MARKETING
RIL had aggressively promoted Jio even before its launch by promising free
data and voice calls. About fifty customer acquisition and relationship
managers were appointed to hire teams that would target signing up users.
The launch of Jio was a massive event attended by a who’s who from politics,
Bollywood , and Indian and international media to ensure that the offer
reached out to the maximum number of people with multi-channel coverage....

RESULTS
According to industry observers, Jio was the fastest growing company in the
world and had crossed 50 million subscribers in a record 83 days. Airtel had
reached the same milestone in 12 years, while Vodafone and Idea had taken
13 years each. According to sources, Jio acquired 1,000 customers per
minute (since September 5 2016) and 6 lakh per day.....

CHALLENGES
Analysts opined that Jio had been a totally disruptive force in the Indian
telecom sector. It had forced competitors like Airtel, Idea, and Vodafone to
experiment with different packages and data pricing strategies in order to
battle its disruptive pricing. Vodafone was in talks for a merger with Idea to
battle Jio’s sales. Analysts projected that Jio’s arrival would generate a trend
of consolidation in the telecom sector. Airtel had slashed its 4G/3G data by
nearly 80% and for corporate customers it had reduced the prices by up to
60%. Airtel also launched a new data plan “myPlan Infinity’ that allowed
consumers to make voice calls for free. Idea slashed data tariffs by up to 67%.
Airtel entered into a definitive agreement with Norwegian telecom operator
Telenor Group (Telenor) on February 23, 2017. As a result of the acquisition,
Airtel would take over Telenor India’s spectrum, licenses and operations,
including its employees and customer base of 44 million. Analysts felt that
with this move Airtel intended to defend itself against Jio’s sales...

THE ROAD AHEAD


In February 2017, Jio announced a strategic partnership with Uber
Technologies Inc. (Uber) aimed at bringing the benefits of Jio Digital Life
ecosystem to their users. The agreement would allow Uber riders to pay for
their rides using JioMoney and thereby enhance the digital transaction
ecosystem in India. Anirban S Mukherjee, business head, JioMoney, said, “Jio
aims to bring the benefits of evolving digital technologies to every Indian
through an entire ecosystem that will allow Indians to live Digital Life to the
fullest. JioMoney’s integration with Uber will power the rapid migration of
many more Uber transactions to the digital platform.” Jio was reportedly
gearing up to expand the company’s product portfolio by venturing into
diverse areas such as broadband services and Direct-to-Home (DTH) TV
services. It was expected to launch DTH services, which planned to offer
more than 350 channels...

SWOT ANALYSIS OF RELIANCE JIO


Reliance Jio Infocomm Limited or Jio as it is popularly known as a mobile
network service based on LTE technology owned by the Reliance
Industries. The company whose headquarters is in Navi Mumbai offers
wireless 4 G network services and has the credit of being the only VoLTE
operator in India currently.

The network covers the whole of India and is the largest Internet Service
provider in the country. Reliance Jio launched its services for the first time
in 2015 and became commercial in September 2016. The company
currently has a gross revenue of 108.9 million as of the year 2016-17.

Strengths in the SWOT analysis of Reliance Jio :


Strengths are defined as what each business does best in its gamut
of operations which can give it an upper hand over its competitors. The
following are the strengths of Reliance Jio:

 Strongest Customer Acquisition strategy – Reliance Jio probably


has the best customer acquisition strategy till date. The brand offered
their services for free for 3-6 months to all their users. This resulted in
millions of users using Reliance Jio and resulted in one of the best
customer acquisition strategy in the history of telecom.
 Strong customer base – Jio boasts of a whopping 100 million
subscribers in the first 170 days of its launch a record which no other
provider has been able to register. This has also made Reliance Jio
India’s largest Internet Service Provider.
 Technology – Jio currently uses the latest 4 G LTE technology which
is one of the world’s best technologies for the future. This is
supported by Voice over LTE which makes it scalable and supportive
of 5G and 6 G technologies which are expected to be the future in
wireless communication.
 Strong backing of parent company Reliance Industries: Reliance
Industries is a credible brand which echoes with Indian sentiments
and has high trust amongst customers. The association of Jio with
Reliance acts as a core strength.
 Brand Management – The reason for the huge customer base of
Reliance Jio is the brand management strategies that it has adopted.
The right promotion backed by lucrative offers and credible brand
ambassadors like ShahRukh Khan and Amitabh Bachchan have
helped in building connectivity with the customers.
 Fast and wide network – Reliance Jio has a presence in all 22
telecom circles in India and is known to be a robust and fast network
with zero connectivity issues.
 Multiple offerings under a single name – Reliance Jio offers a
variety of services like movies, games, shopping, chats, and
messenger etc. giving the customer a lot of options to choose from.

Weaknesses in the SWOT analysis of Reliance Jio :

Weaknesses are used to refer to areas where the business or the


brand needs improvement. Some of the key weaknesses of Reliance Jio
are:
 Late entry into the market: Reliance Jio has made a late foray into
the market which already had established players
like Airtel and Vodafone who had occupied a place in the minds of
the customer.
 Activation Issues – Reliance Jio faced numerous gestation issues
owing to not being able to contain the huge volumes of customers it
had acquired. On such was delays in SIM Card activation during the
period that followed its launch.
 Pricing Controversies – Reliance Jio was criticised for having
lowered its prices beyond what was ethical to penetrate into the
market and this stirred allegations like corruption and money
laundering against them.
 Too many freebies – Reliance Jio currently offers many services for
free and this was one reason for share increase in sales. However,
the company may not be able to afford all of them in the long run
which may affect the business negatively.
 Data connection poor – The data connection is many times poor
from Reliance Jio and the range is less causing slower loading
speeds in selected regions.

Opportunities for the SWOT analysis of Reliance Jio :

Opportunities refer to those avenues in the environment that surrounds the


business on which it can capitalize to increase its returns. Some of the
opportunities include:

 Future driven technology – Reliance Jio uses VoLTE 4G network


which is scalable to accommodate
 5G and 6G technologies.This offers numerous avenues to Jio or
future expansion of bandwidth.
 Apps – Reliance Jio has VoLTE which has a lot of scope in terms of
bandwidth.Thus they can offer apps to customers which are
chargeable or even free initially and pay per use later.
 Competitive Pricing Strategies – Reliance Jio prides itself on being a
low-cost Internet service provider and mobile operator. This can be
used as a positioning to target more markets and grow their market
share since most of their competitors’ cannot afford their prices.
 Expansion to other countries – Currently Reliance Jio is
operational only in India. There is, however, a lot of scope for
expansion to foreign countries at least in the neighboring regions.
Threats in the SWOT analysis of Reliance Jio :

Threats are those factors in the environment which can be detrimental to


the growth of the business. Some of the threats include:

 Risk of loss of customers – Customers prefer Jio primarily because


of the low prices that they offer. At a stage when the company
increases its price there may be a loss of customers.
 Removal of free services – Jio currently is associated with a lot of
freebies.Once these are removed there may be a drop in sales for
the company.
 Criticism and negative image – Reliance Jio has been embroiled in
a lot of controversies from the time it was started. These have
resulted in a negative brand image for the company.
 Poor Code of ethics – Many of the strategies adopted by Reliance
Jio such as the low pricing, free bandwidth and market
penetration strategies have been showcased as unethical and this
may affect the goodwill of the business in the long run.
APPLICATION OF COMPUTER IN BUSINESS

Not only do businesses use computers to carry out different functions, they also
use many different types of computers to carry out those functions. These
functions include laptops, PCs, servers, and even smartphones. Because of
computers, concepts such as flexible working schedules and remote work forces
have become possible – enabling employees to work from wherever they want
and at whatever times they wish.

Computers Are Used for Communication


When it comes to establishing contact with clients, computers are a vital tool;
they are also vital when it comes to maintaining that contact. This is a very
important computer application in business, enabling a business to communicate
with its clients via email, IM, Skype, collaboration software, and via various other
communication solutions that a business might wish to use.
Computers Are Used for Marketing

Computers allow a business to perform a variety of tasks. For starters, with the
help of the internet, computers help put a business on the map. With a computer,
a business’s team of IT developers can create a professional website complete
with enticing graphics and content with different forms of media, such as text,
images, and videos. They can do search engine optimization – SEO – for the
website so that it appears prominently in Google’s search results, which then
attracts traffic, which, ultimately, will enable the business to sell those products to
website visitors.

Computers Are Used for Accounting

Accounting is a function in which accuracy is of the utmost importance. When


you perform accounting functions – and you have nothing nothing except pen
and paper - and you're relying solely on brain power, you expose yourself to
errors. Accounting software helps prevent that from happening.

Accounting software enables a business to quickly and accurately obtain large-


and small-scale pictures of the company's financial situation. All the employees
need to do is to input his financial information into the software and – with a few
clicks – the employees understand everything about the financial health of the
business' operations.

Computers Are Used for Storage

Businesses have come a long way from the era of filing cabinets thanks to
computers. Although a filing cabinet will occupy a very large space but will store
only a small amount of information, a computer will occupy only a fraction of that
space but it will store thousands of times the amount of information. With
computers and servers, businesses are able to store and sort millions of files, to
enable the business to access at any time.

Computers also enable a business to store its data in different ways. The
business could store the data in a central location, and it could have other
computers on the network access the data whenever the business needs to;
when the business has the permission to; or, when the business could store the
data locally on individual computers.

Computers Are Used for Educational Purposes

Computers can be used to educate employees. A business can use a computer


to educate the employees on such things as the company policy, software use,
as well as standard procedures and safety.

Rather than hire teachers to teach its employees, a business can let employees
learn what the employee needs, by learning at their own pace via webinars and
live Q&A sessions. With the internet, a business' employees will have access to a
world of information, and the business will not need to create all of its own
educational content.

Computers Are Used for Research

Computers allow a business to do a variety of things, including research about


the competition, as well as what its customers want. With modern data-mining
techniques, a business can acquire insightful information about its customers and
competition from all kinds of places, including forums, search engines, industry-
specific websites and even from social networks.
USE OF COMPUTER IN E-PAYMENT
Since there is no escape from making online payments in today's world, you must take
adequate precautions to keep your money safe. Below are 10 steps that can ensure
safe online payments:

1. Search the Internet carefully


When you are looking for product reviews or price comparisons on a search engine, you
run the risk of unintentionally clicking on a ‘poisoned’ search result that can lead you to
malware instead of your intended destination.

2. Type, don't click


Type the URL in the address bar instead of clicking a link to go to your chosen retailer’s
website. It may take a little more effort, but this simple action can help avoid visiting fake
and malicious websites. Ensure that the link starts with 'https'. The 's' symbolises a
secure site. Make sure there is a padlock symbol in the browser window frame
whenever you visit a payment site.

3. Get a temporary credit card


Some credit card companies issue temporary credit card numbers for their customers.
These temporary numbers are meant for one-time purchases. Even if the information is
stolen, it is of no use. However, you cannot use them for purchases that require regular
payments and auto-renewal. In that case, use a credit card that has a low limit.

5. Use a dedicated email address


Create an email address only for online shopping. This can help you reduce the risk of
opening potentially malicious email or spam messages which are disguised as various
kinds of notifications or sales promotion.

6. Use a password manager


A password manager can help you deal with multiple accounts. A manager encrypts
passwords which would otherwise be in plain text. A manager will also help you avoid a
common mistake—keeping one password for all your accounts. Some antivirus and
Internet security products include password management and password security
features.

7. Avoid public Wi-Fi/computers


Never do financial transactions on a public Wi-Fi. Hackers can intrude easily into a
public WI-Fi network and steal your login details. If you need to make a financial
transaction when you are out, use your own mobile phone network.

8. Keep your data to yourself


Don't save your bank and personal details in a browser or a payment site. Type the
information whenever you make a transaction. Don't forget to log out every time you log
in.

9. Avoid apps that you can’t trust


Often, smartphone apps carry malware. If you are not sure of an app, don’t download it
instantly. Spend a little time reading about it, going through its terms and conditions and
knowing what current users say about it. Only download apps from the official app store.

10. Buy from a reputed merchant


Before making payments online, make sure your merchant is reputed and trusted.
Websites of many small merchants are not secure enough to prevent data theft. If you
think the merchant is not trustworthy, don't pay online. Opt for cash on delivery.
MS-POWERPOINT – PPT ON RELIANCE JIO

Questions
1. Type all the heading and sub-heading using sub-menu bold from the
home menu.
2. Type the content using Helvetica font from home menu.
3. Write all heading and sub-heading using sub-menu font size 16 from
font size sub-menu from home menu.
4. Highlights all the important word using sub-menu single underline
from home menu.
5. Type the paragraphs using sub-menu fontsize 13.
6. Adjust all the contents so that all the headings and sub-headings are
visible.
7. Put the heading as ppt on reliance jio by using sub-menu font size 16.
8. Add the space between lines using sub-menu line spacing so that it is
visible.
9. Save the ppt as ppt on reliance jio.

You might also like